Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2013

Discipline
Institution
Keyword
Publication
Publication Type

Articles 151 - 171 of 171

Full-Text Articles in Computer Law

Table Of Contents Jan 2013

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley Jan 2013

Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley

Articles

A seminar on Artificial Intelligence ("Al") and Law can teach law students lessons about legal reasoning and legal practice in the digital age. Al and Law is a subfield of Al/computer science research that focuses on designing computer programs—computational models—that perform legal reasoning. These computational models are used in building tools to assist in legal practice and pedagogy and in studying legal reasoning in order to contribute to cognitive science and jurisprudence. Today, subject to a number of qualifications, computer programs can reason with legal rules, apply legal precedents, and even argue like a legal advocate.

This article provides a …


Google And Search-Engine Market Power, Mark R. Patterson Jan 2013

Google And Search-Engine Market Power, Mark R. Patterson

Faculty Scholarship

A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …


Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor Jan 2013

Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor

Scholarly Works

Educators are constantly seeking new sources of relevant material to illustrate doctrinal and practice topics. With the growing understanding of students’ different learning styles, as well as the expansion of high-speed network connections and large displays in the classroom, streaming video has begun gaining popularity as an educational tool. Films, television programs, and real-time and archived legislative and court sessions may provide examples (both positive and negative) to enhance pedagogy. One increasingly common source for streaming content is a commercial video provider such as Netflix, Amazon, and Hulu. Even where such providers do not offer educational or institutional services, educators …


System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter Jan 2013

System-Generated Digital Forensic Evidence In Graphic Design Applications, Enos Mabuto, Hein Venter

Journal of Digital Forensics, Security and Law

Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents such as identity documents (IDs), driver’s licences, passports, etc. However, the use of any graphic design application leaves behind traces of digital information that can be used during a digital forensic investigation. Current digital forensic tools examine a system to find digital evidence, but they do not examine a system specifically for the creating of counterfeit documents created through the use of graphic design applications. The paper in hand reviews the system-generated digital forensic evidence gathered …


From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe Jan 2013

Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe

Books

Openness has become a common concept in a growing number of scientific and academic fields. Expressions such as Open Access (OA) or Open Content (OC) are often employed for publications of papers and research results, or are contained as conditions in tenders issued by a number of funding agencies. More recently the concept of Open Data (OD) is of growing interest in some fields, particularly those that produce large amounts of data – which are not usually protected by standard legal tools such as copyright. However, a thorough understanding of the meaning of Openness – especially its legal implications – …


Man Versus Machine Review: The Showdown Between Hordes Of Discovery Lawyers And A Computer-Utilizing Predictive-Coding Technology, Nicholas Barry Jan 2013

Man Versus Machine Review: The Showdown Between Hordes Of Discovery Lawyers And A Computer-Utilizing Predictive-Coding Technology, Nicholas Barry

Vanderbilt Journal of Entertainment & Technology Law

The discovery process is regularly capturing millions of pages of documents. Electronic storage is making storing documents cheaper and easier. When litigation begins, however, sorting through this massive amount of electronically stored information is costly and time intensive. Keyword searches are a start to managing the growing amount of electronic documents, but the discovery process is still falling behind in efficiency. Predictive coding could change all that.

Predictive coding is capable of solving the time-intensive nature (and resultant growing cost) of processing discovery documents. Predictive coding is faster, cheaper, and more accurate than traditional linear document review, the current "gold …


Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page Jan 2013

The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Giving Purpose To Your Life As A Legal Writer, David Spratt Jan 2013

Giving Purpose To Your Life As A Legal Writer, David Spratt

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte Jan 2013

Mad Men Posing As Ordinary Consumers: The Essential Role Of Self-Regulation And Industry Ethics On Decreasing Deceptive Online Consumer Ratings And Reviews, 12 J. Marshall Rev. Intell. Prop. L. 462 (2013), Lucille M. Ponte

UIC Review of Intellectual Property Law

Technology provides consumers with new ways to avoid advertisements, such as fast forwarding through TV commercials and using filtering software to block pop-up ads. Accordingly brand sponsors and their advertising marketing firms have sought alternative methods to pierce through consumer resistance to ads. Social media offers an optimal platform to reach millions of consumers on a nearly daily basis who interact and often rely heavily on the reviews and rankings of fellow consumers. However, many of today’s branding campaigns now mask sponsored ads as ordinary consumer reviews or “Like” and “Don’t Like” responses to a service or product. Unbeknownst to …


Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach Dec 2012

Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach

Ulf Maunsbach

During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael Dec 2012

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael Dec 2012

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Emerging Technologies And Dwindling Speech, Jorge R. Roig Dec 2012

Emerging Technologies And Dwindling Speech, Jorge R. Roig

Jorge R Roig

Inspired in part by the recent holding in Bland v. Roberts that the use of the “Like” feature in Facebook is not covered by the Free Speech Clause, this article makes a brief foray into the approach that courts have taken in the recent past towards questions of First Amendment coverage in the context of emerging technologies. Specifically, this article will take a closer look at how courts have dealt with the issue of functionality in the context of First Amendment coverage of computer source code. The analysis of this and other recent experiences, when put in a larger context, …


What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson Dec 2012

What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson

Stephen E Henderson

This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …


Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq. Dec 2012

Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …